 |
|
 Inside Microsoft SharePoint 2013 (Developer Reference)
Build custom SharePoint solutions with architectural insights from the experts.
Take a deep dive into SharePoint 2013, and master the intricacies for designing and implementing robust apps and other business solutions for your organization. Led by an author team with in-depth knowledge of SharePoint architecture,... |  |  Microsoft DirectAccess Best Practices and Troubleshooting
Secure and efficient functioning of your DirectAccess environment
Overview
-
Learn how to make Manage Out work for your DirectAccess clients without compromising your network
-
Learn how to understand enormous logfiles along with common troubleshooting criteria
-
Explore some...
|  |  iOS 7 Game Development
Develop powerful, engaging games with readytouse utilities from Sprite Kit
About This Book
-
Pen your own endless runner game using Apple's new Sprite Kit framework
-
Enhance your user experience with easy-to-use animations and particle effects using Xcode 5
-
Utilize...
|
|
 FreeSWITCH 1.6 Cookbook
Over 45 practical recipes to empower you with the latest FreeSWITCH 1.6 features
About This Book
-
Learn how to create a fast and secure messaging and telephony system with FreeSWITCH
-
Trap all the common functionalities of the telephony platform using popular communication protocols
... |  |  Starling Game Development Essentials
Develop and deploy isometric turn-based games using Starling
Overview
-
Create a cross-platform Starling Isometric game
-
Add enemy AI and multiplayer capability
-
Explore the complete source code for the Web and cross-platform game develpment
In... |  |  Blackhatonomics: An Inside Look at the Economics of Cybercrime
Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus... |
|
|
 VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering... |  |  Microsoft System Center 2012 Orchestrator Cookbook
Automate mission-critical tasks with this practical, real-world guide to System Center 2012 Orchestrator
Overview
-
Create powerful runbooks for the entire System Center 2012 product line
-
Master System Center 2012 to create advanced runbooks
-
Learn how to install System Center...
|  |  Java Security (Java Series)
Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with... |
|
Result Page: 9 8 7 6 5 4 3 2 1 |